A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
Two separate operations in a product require different amounts of time to complete, in a way that is observable to an actor and reveals security-relevant information about the state of the product, such as whether a particular operation was successful or not.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Athlon_firmware | Amd | - (including) | - (including) | 
| Amd64-microcode | Ubuntu | bionic | * | 
| Amd64-microcode | Ubuntu | focal | * | 
| Amd64-microcode | Ubuntu | hirsute | * | 
| Amd64-microcode | Ubuntu | impish | * | 
| Amd64-microcode | Ubuntu | kinetic | * | 
| Amd64-microcode | Ubuntu | lunar | * | 
| Amd64-microcode | Ubuntu | mantic | * | 
| Amd64-microcode | Ubuntu | oracular | * | 
| Amd64-microcode | Ubuntu | trusty | * | 
| Amd64-microcode | Ubuntu | trusty/esm | * | 
| Amd64-microcode | Ubuntu | xenial | * |